Feeds

People's Republic says it will purge self of illicit software

Ownership of means of production now compulsory

Application security programs and practises

China is to clamp down on counterfeit software installed on local and central government computers over the next year.

According to Beijing-endorsed news agency Xinhua, officials expect to complete an inspection of the software used by the country’s government departments and agencies by May 2011.

They will conclude their findings in October next year, according to the National Copyright Administration’s flack Yan Xiahong.

"Greater efforts will be made to establish a long-term mechanism comprising funding, procurement, utilisation and asset management for ensuring the use of genuine software among government organs," he said.

The NCA and other People's Republic organisations issued a joint statement way back in 2006 when they demanded that all government agencies and departments should only purchase computers with authorised and genuine software installed.

China’s government organisations spent a total of ¥794m between 2007 and the end of last year on genuine software. But the official figures reported by Xinhua didn’t provide a breakdown of how much of that money went to Microsoft.

However the very fact that an official inspection of China’s central and local government computer systems is underway seems to suggest that the Beijing government has so far failed to tackle the issue of fake software even within its own systems.

Microsoft has of course long complained about the prevalence of software piracy in the People’s Republic.

In June, Big name bosses at 12 tech companies – including Microsoft CEO Steve Ballmer – met with US lawmakers and White House officials to complain about illegal software-copying in China.

According to the Business Software Alliance lobby group, 79 per cent of China's computers ran on counterfeit software in 2009.

Concerns have been expressed by the likes of Ballmer and Adobe's Shantanu Narayen about China's planned "indigenous innovation" guidelines on Intellectual Property transfers, complaining that it could unsettle the US economy.

Beyond that, Microsoft had its first litigation win in China when the company was victorious in a court battle against the Shanghai-based corporation Dazhong Insurance in April this year.

The insurance company was found guilty of using unlicensed MS software and was ordered by the court to pay Microsoft damages of ¥2.17m, or $318,000. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.